Many groups are interested in the insider threat problem, but the model generally used by all of these groups is implicitly binary—one is either within a perimeter or not. There...
Matt Bishop, Sophie Engle, Sean Peisert, Sean Whal...
The progression of implementation of an information systems strategy in a UK acute hospital is described. The case study describes the IS strategy, the conditions that led to its ...
: This paper describes how ADEPT's agent-based design and implementation philosophy was used to prototype a business process management system for a real-world application. Th...
Nicholas R. Jennings, Peyman Faratin, Timothy J. N...